Digital Security Articles & Newsletters

    Header image with the Freedom of the Press Foundation logo, a black graduate cap, and the title, “J-school Digital Security Curriculum” along with a link, fpf.training/curriculum

    New journalism curriculum module teaches digital security for border journalists

    AnnouncementsNews Release

    New journalism curriculum module teaches digital security for border journalists Module developed by Freedom of the Press Foundation, Electronic Frontier Foundation, and University of Texas at El Paso guides students through threat modeling and preparation San Francisco – A new college journalism curriculum module teaches students how to protect themselves …

    Freedom of the Press Foundation (CC BY 4.0)

    Eavesdropping on AirPods?

    Newsletter

    Apple released a firmware update patching a critical Bluetooth vulnerability in AirPods, AirPods Pro, AirPods Max, Powerbeats Pro, and Beats Fit Pro. According to its support page, an adversary in Bluetooth range could spoof as an intended source device for these wireless headphones. When the targeted headphones send a connection request to the spoofed device, it could eavesdrop on confidential conversations.

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: File safety

    Guide

    This module begins with a short discussion about information hidden in files, and the potential risks tied to file metadata. It follows with a short exercise to have students find the file metadata embedded in a photo, followed by discussion of risk minimization.PrerequisitesThreat modeling(Good to know) Malware …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Chat safety

    Guide

    This section is intended to quickly introduce chat safety considerations through some examples of tip channels currently supported by newsrooms, followed by discussion time, and finally, hands-on installation of the Signal app. Students may need time to troubleshoot, so we encourage pairing students, and being prepared to help students if …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Obfuscating location

    Guide

    This module opens with an introduction to the need for location obfuscation techniques, and what a VPN does. Instructors may then talk through basics of IP addresses, Virtual Private Networks, and the Tor network. Students will be asked to install Tor and navigate to the New York Times SecureDrop .onion …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 1)

    Guide

    This module opens with an introduction to common attacks on online accounts, and the need for two-factor authentication. It then moves on to a few activities having students investigate the security of their own passwords, and where they might set up two-factor authentication for their primary email provider. It closes …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 2)

    Guide

    This short module opens with an introduction to the problem space (password reuse), followed by introducing password managers, and optionally having students install one and sign up for an email with a randomized password.PrerequisitesThreat modeling(Good to know) Authentication - Part 1Estimated time20-25 minutes (35-40 minutes …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Social engineering

    Guide

    This short module opens with a video of a social engineering professional showing off her skills, then moving on to some psychological principles and tactics underlying social engineering approaches. Next, it includes a brief activity asking students to a consider how a social engineer might get their credit card number. …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Threat modeling

    Guide

    Threat modeling is foundational to thinking through security broadly, and we therefore introduce it before several other more technical topics. We first encourage the use of physical metaphors (e.g., choosing how and where to lock a bicycle) before introducing digital applications to help beginners understand how they may already create …